- North Korea-linked Hackers have stolen over $2 billion in cryptocurrency assets in 2025, marking the highest annual total to date.
- The cumulative known thefts connected to North Korea exceed $6 billion, funds believed to support the country’s nuclear and missile programs.
- Most 2025 attacks have targeted crypto exchanges and wealthy individuals, primarily through social engineering tactics.
- Laundering methods have become more complex, involving multiple blockchain mixing and cross-chain transactions.
- Blockchain transparency aids investigators in tracing stolen assets, with firms like Elliptic playing a key role in attribution and interdiction.
In 2025, hackers linked to North Korea have stolen more than $2 billion in cryptocurrency, representing the largest yearly amount recorded, with three months remaining. These thefts have mainly targeted cryptocurrency exchanges and affluent individuals worldwide.
The cumulative thefts attributed to the regime now total over $6 billion. According to the United Nations and government sources, the stolen funds are believed to be crucial in supporting North Korea’s nuclear weapons and missile programs.
This year’s significant losses include a $1.5 billion theft in February from the cryptocurrency exchange Bybit. Other victims publicly attributed to North Korean hackers in 2025 include LND.fi, WOO X, and Seedify. To date, Elliptic has linked over thirty additional hacks this year to North Korean groups.
Experts note that attribution combines blockchain analytics, laundering pattern observations, and intelligence sources. Some hacks show similarities but lack sufficient evidence for definite attribution. Many incidents remain unreported or unidentified.
Compared to previous years, this amount nearly triples 2024’s total and surpasses the previous record of $1.35 billion stolen in 2022, which included high-profile attacks on Ronin Network and Harmony Bridge.
The methods used in 2025 mainly involve social engineering—a strategy where attackers manipulate individuals to gain access—marking a shift from earlier technical exploits of crypto infrastructure vulnerabilities.
In addition, laundering stolen cryptoassets has become increasingly sophisticated. Techniques include multiple mixing rounds—which blend cryptocurrency to obscure its source—cross-chain transactions moving assets across different blockchains, and using less common blockchains to evade tracking. Other methods involve acquiring utility tokens, redirecting funds to fresh wallets, and creating specialized tokens within laundering networks.
Despite these tactics, blockchain’s open ledger system allows investigators to trace stolen funds. Each transaction leaves a trace, enabling tracing across networks. Elliptic, a leading blockchain analytics firm, actively attributes stolen funds to aid global financial institutions in blocking illicit transactions.
The growing scale of theft and evolving tactics highlight the ongoing challenges in crypto security. Advanced forensic tools help maintain transparency and enable law enforcement and businesses to better detect and prevent illicit activities within the cryptocurrency ecosystem.
✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.
Previous Articles:
- S&P Launches Crypto-Stock Index With Strict Market Cap Criteria
- Bitcoin Surges Past $126K as Crypto Traders Brace for 2026 Boom
- North Korean Hackers Steal $2B in Crypto in Record 2025 Heists
- Ken Griffin Warns as Gold, Bitcoin Surge and Dollar Loses Safe Haven
- Bitcoin Slips After Record High as U.S. Government Shutdown Continues